Zero Trust Blog

Zero Trust Blog

Blogs on Zero Trust Solutions | Cybersecurity Stories

Is Zero Trust the Right Choice for OT(Operational Technology)?
Zero Trust Access

Is Zero Trust the Right Choice for OT(Operational Technology)?

Organisations with operational technology environments like factories and critical infrastructure are undergoing a significant transformation. Traditionally, these systems were isolated from regular business networks through "air-gapping," but this separation is rapidly disappearing.  The convergence of information technology (IT) networks and operational technology is taking place to fulfil the
4 min read
What is an Authorisation Code with Proof Key for Code Exchange (PKCE)?
Multi Factor Authentication

What is an Authorisation Code with Proof Key for Code Exchange (PKCE)?

Businesses demand robust authentication mechanisms to protect user data and prevent unauthorised access. OAuth 2.0 has emerged as a critical protocol for secure authentication, with the Authorisation Code flow with PKCE representing a significant advancement in protecting users during the authentication process.  This innovative approach addresses critical security vulnerabilities
4 min read